Package: release.debian.org Severity: normal Tags: buster User: release.debian....@packages.debian.org Usertags: pu
Hi folks, Similarly again for Buster... We'd like to push an update for fwupd in Buster. It's not as far out of date as that in Stretch, but it's starting to show its age and security worries (again CVE-2020-10759). To fix things and to allow us to keep on top of security and other important issues, we'd like to update to the head of the current stable release branch (1.12.x). Mario, the primary maintainer in Debian, is also part of the upstream development team and has been working to maintain that. Apparently Ubuntu and other distros have switched to this already. This *does* mean that the debdiff is *way* too large to fit in mail, sorry. :-( I've put a copy up at https://www.einval.com/~steve/debian/fwupd_1.2.13-1_amd64.debdiff.gz for reference. Sorry this is so big and so late... :-( -- System Information: Debian Release: 10.4 APT prefers stable-debug APT policy: (500, 'stable-debug'), (500, 'stable'), (500, 'oldstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.118+ (SMP w/4 CPU cores) Kernel taint flags: TAINT_UNSIGNED_MODULE Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en (charmap=UTF-8) Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled